Distributed Authentication and Key Management in Wireless Mesh Networks

نویسنده

  • Rani Husseiki
چکیده

Authentication and Key Management (AKM) in Wireless Networks have been addressed in the IEEE 802.11i standard [10]. However, the IEEE 802.11s [21] Wireless Mesh Networks impose some further AKM requirements due to their large scale, distributed functionalities and decentralized authority. According to the IEEE 802.11s specifications, any security solutions should rely on IEEE 802.11i mechanisms. However, considering the architecture and specifications of a Wireless Mesh Network, an adaptation of the 802.11ibased mechanisms and AKM procedures to the new security framework of a Mesh is necessary, especially that IEEE 802.11i has been designed without multi-hop communication and Wireless Mesh Networks in mind. The thesis tackles the AKM mechanisms and protocols that are currently under considerations for possible use inWireless Mesh Networks. It presents a detailed analysis of the different possible AKM schemes. It sheds the light on critical introduced enhancements and modifications with respect to IEEE 802.11i as to fulfill the MAC layer security requirements for Wireless Mesh Networks. Moreover, a Distributed Authorization Model is proposed to ensure AKM efficiency. It allows multiple WMN application scenarios. The scheme is based on PKI mechanisms involving issuing, renewing and revocation of certificates, and it employs a threshold authorization scheme in order to cope with the decentralized nature of Wireless Mesh Networks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

Toward an energy efficient PKC-based key management system for wireless sensor networks

Due to wireless nature and hostile environment, providing of security is a critical and vital task in wireless sensor networks (WSNs). It is known that key management is an integral part of a secure network. Unfortunately, in most of the previous methods, security is compromised in favor of reducing energy consumption. Consequently, they lack perfect resilience and are not fit for applications ...

متن کامل

Hypercube Bivariate-Based Key Management for Wireless Sensor Networks

Wireless sensor networks are composed of very small devices, called sensor nodes,for numerous applications in the environment. In adversarial environments, the securitybecomes a crucial issue in wireless sensor networks (WSNs). There are various securityservices in WSNs such as key management, authentication, and pairwise keyestablishment. Due to some limitations on sensor nodes, the previous k...

متن کامل

Optimal Node Placement in Distributed Wireless Security Architectures

Wireless mesh networks (WMNs) are currently accepted as a new communication paradigm for next-generation wireless networking. They consist of mesh routers and clients, where mesh routers are almost static and form the backbone of WMNs. Several architectures have been proposed to distribute the authentication and authorization functions in the WMN backbone. In such distributed architectures, new...

متن کامل

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006